CN104885403A - Method for producing dynamic data structures for authentication and/or password identification - Google Patents

Method for producing dynamic data structures for authentication and/or password identification Download PDF

Info

Publication number
CN104885403A
CN104885403A CN201380054832.5A CN201380054832A CN104885403A CN 104885403 A CN104885403 A CN 104885403A CN 201380054832 A CN201380054832 A CN 201380054832A CN 104885403 A CN104885403 A CN 104885403A
Authority
CN
China
Prior art keywords
user
group
input
string
certification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201380054832.5A
Other languages
Chinese (zh)
Other versions
CN104885403B (en
Inventor
阿历詹德·V·纳蒂维达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CN104885403A publication Critical patent/CN104885403A/en
Application granted granted Critical
Publication of CN104885403B publication Critical patent/CN104885403B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • User Interface Of Digital Computer (AREA)
  • Storage Device Security (AREA)
  • Computing Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

A method for generating a changing authentication input or password generation and input for a user is provided for allowing access to a computing device such as a smartphone or computer or using the computing device to communicate over a network to a server. Using objects displayed in positions on a graphic display, and input strings of text or alphanumeric characters the user has related to each object, or are randomly assigned, a password can be generated by combining the input strings related to paired objects. The password can be varied easily for each access attempt by changing the objects displayed and/or the sequence.

Description

Produce the method for dynamic data structure for certification and/or cipher
Technical field
The application claims applying date is the priority of the U.S. Patent Application No. 13/593,287 on August 23rd, 2012; The full content of this priority application all comprises in this manual.The present invention relates to Information of Science and Technology, more specifically, the present invention relates to a kind of method producing data structure, it adopts dynamic graphical user interface (graphic user interface is called for short GUI), and for cipher.
Background technology
In recent years, more people start the sci-tech product at work and dependence PC in life, smart phone, panel computer and various other device all kinds of etc., and wherein a lot of people can information of personal information such as address, password, e-mail, telephone number, bank account, credit card, social security number, family and friends etc. storage in these devices.
Traditionally, these electronic installations can require that cipher just can allow the data storing in user's access device and access device or accessed by device.Usually, user when the software of initial start device, " can login " space of a whole page at it and sees such cipher requirement.But, in order to guarantee fail safe further, the archives that a lot of people also can specify with cryptoguard again, e-mail and other confidential data.
The reason of protection of accessing to your password is very simple, and the user being exactly device wants to prevent invader's such as other hacker and thief etc. access device and obtains personal information or obtain user's secret or private data by access device.If do not have cryptoguard, invader just can collect the useful data got by invading, usurp the personal identification of device possessor on line.
Therefore, identity theft has been swindled with computer and has been paid close attention to greatly into one, because when hacker or thief can accessed computer devices, and by the personal information such as credit card number or social security number of its access user, they just can use credit card immediately or set up the credit line of brand-new swindle.Access to your password the access and device itself of protecting archives, electronic directory, archives or the data of specifying, is the precautionary measures that user takes, and avoids such case to occur.
, traditional cryptoguard is only limited to input single serial data, such as alpha-numeric string, symbol, figure and their combination.User or device possessor will remember this serial data, so that correct this serial data of input, thus successful access device or access are transferred by telegram, protected archives and networking line etc.
This conventional method has a lot of defect.First, very commonly user is difficult to keep password firmly in mind, if user needs coded access device or access remote network site, forgets Password and just can form serious problem.In this case, user has to pass through complicated formality just can obtain new password, and usual user needs to answer some personal problems, inputs other personal information at networking or at device, thus certification and really their personal identification.
Therefore, in order to avoid again certain program, some people can select password simply easy to remember.Do the protective effect watching out for thief so very low, clever thief, by searching for the website of open user's personal information as face book (FACEBOOK), can recognize so simple password usually.
Intercept when another kind of defect is that the password of single serial data can transmit at networking easily, or found by the hacker being familiar with computer technology, or exploration and repetition test and be found by inquiry.As long as obtain user's password, other sensitive data that all personal informations of user access down to the device by user all can fall into undelegated third party on hand.Hacker more and more understands acquisition personal information, and the non-protected Wi-Fi that especially all can provide as coffee shop and dining room etc. in public place obtains personal information.Or, as mentioned above, hacker also can by searching for the face book (FACEBOOK) or other similar social network sites password finding use etc. of user, because on these social network sites, user can inadvertently issue password to remember it, or disclose other and can guess data for password, the name or birthday date etc. of the name , Pegs thing dog of such as child.
In addition, the user that some awareness of safety are higher constantly can change password.Likely prevent thief from stealing and assault although do like this, do like this and user also may be made to forget about the password after changing, thus need through above-mentioned complicated formality to prove their identity.In this networking and networking focus fast changing epoch, a lot of user can obtain networking theft software easily, and can think known, the time of personal information safeguard protection is more arduous.
Therefore; market continues a kind of method adopting personal information safeguard protection software of demand; this method produces a kind of data structure or serial data; for cipher; safeguard protection is provided; it also only allows specific user to have the ability to use, and make user more easily remember password or more easy to identify go out oneself password.The system of this method is devoted to adopt graphic user interface (the graphic userinterface continuing to change and user is visual, be called for short GUI) come the mandate of identification user and/or password and/or change of secret code, and provide a kind of means for their change mandate of user's identification.The desired data structure (password) of this method and individual different for user produces in each authentication phase (namely logining operation), thus allow user can adopt this GUI dynamically changed, based on the password that the encoding condition preset is determined instantly, and/or allow GUI be used as interface, suitable password message is sent to the system needing password.The system of this method needs to provide a kind of means, and this means need to continue the password of change or produce the password continuing to change for user, and the condition that this password can only be preset by user could be determined.Because password or GUI are secrets, hacker and identity thief etc. just cannot obtain the data of user.This method also adopts broadcast communication to encrypt.
The example of above-mentioned background technology and its relevant be limited only to example, and non-exclusive, do not mean that their description of this invention and claim form any restriction yet.By reading and understanding the following description and accompanying drawing, those skilled in the art more clearly can understand the various restrictions of background technology.
Summary of the invention
The shortcoming solving prior art is intended at the device of these disclosure and description, and by providing a kind of password or user discrimination method to login a device or computer system for user, thus realize the object of the invention described above.System of the present invention adopts the software run on microprocessor such as server; and be connected with network communication; the configuration of described system aims to provide personal information safeguard protection; make graphic user interface that each user has its individual, that dynamically change (graphic user interface; be called for short GUI), therefore prevent other people from identifying.The GUI of change produces by following one group of user's condition preset, it is for generation of the transmission data string representing password, and this password determine when how to input be secret in user, therefore only have the user setting original user's condition could determine this password.
According to the first preference pattern, GUI is shown as a sequence, matrix that its visual object of user dynamically placed based on input is formed or grid battle array and/or one or more snippets play to the sound that user listens to and formed.User presets the combination of visual object and/or sound, but does not preset the position of object on GUI, does not also preset playing sound for the timing condition of listening to.One of them or its combination in the group that object can be picture, image, short sentence, problem, numeral, color, colored numeral and/or sound etc. are formed, its background being embedded in indicator screen is shown as object to user, or plays to user as the display of sound and indicator screen simultaneously.
Except above-mentioned more than one piece object or multistage sound, user's also just every part object or every section of sound presets one related word, so that recognition and transmission when logining.Such as, object can be the photo of user childhood Pegs thing dog, and to input on screen or title " Spot " (spot) of the related word Ke Yi Shi Pegs thing dog right with marker ligand; Or, logining the photo that the object that the space of a whole page shows can be an old woman, preferably grandmother or other woman that user may be only had just to know, it can obtain and distribute word " Granny " (grandmother) as input on screen or the word right with marker ligand; Or, also can select a problem, show when user logins, and only have user just to know as the related word of answer.In addition, also can provide the sound that user easily recognizes when playing, the sound of such as mother or the sound of other relative or friend, input word or the object of pairing for user.
More than one piece object and/or multistage sound are that user selects, and it is catchy to be therefore also that user holds.When a device or system need a password or security personnel's input to access, GUI can be sent out and be shown to user, which show the sequence of object, grid battle array (X-Y grid battle array) or matrix, wherein object is shown in each different position randomly on shown GUI, or also contain one or more snippets sound, it is play when inputting play instruction simultaneously, or as the object of sound recognition, identify for user.Therefore, to user's display and also be the picture of user individual, photo and sound is stored in a data bank, in logining afterwards, send to user for playing instrument by screen or sound.
Before logining after described, user also can first preset order or sequence condition, for the sound that user to select GUI on the object of arrangement subsequently or plays when GUI show, and think that icon, photo, picture or the word matched matches when inputting the word that associates with each object or sound subsequently or object or sound and user are seen or seen.
By such sequence, and for visually recognizing the instrument of object or the instrument identification sound by playing sound, the sequence that on its sequentially corresponding GUI, the user of display is known, just can determine authentication password string or arrangement.The defining method of password or certification string be user according to specific sequence inputting corresponding dynamically associate word string, wherein dynamically associate the word that word string presets by user and define, the word preset then associates with seen object; Or by drag and drop method, the object of shown pairing and word pairing, or shown object and second object preset are matched, or shown in associating an icon or with the sound play, object or word shown in object and another match.Such as, user plays one section of sound by click one icon that broadcasts, and this section of sound is the sound of mother.Afterwards user understand drag and drop with the play sound icon that associates and another object match, this another object is photo or the display of mother.
The text event detection of present system software supervision user and image action, therefore ole Server OLE is recognized, then use to allocate in advance at that time and associate numeral or coding to the sound's icon with the random of mother's pattern, generation certification string, is sent to device or networking accesses for networking.Native system software is being temporary in the string that in memory body, one or more is formed based on the random train being instantly dispensed to each sound and object, match with the certification string of described generation, thus determine whether user creates a correct password string by the pairing that pairing inputs or it the combines input of word or image with the action of identification object and/or sound.
According to a simple example, GUI can be shown as the order that three objects are in line.First user sets their optimized encoding condition.In the setting of encoding condition, user selects multiple, such as three patterns, and these patterns are all that user knows, and then distribute related word easy to remember for each pattern.User makes the paired-word that associates with pattern or object or sound or associates pattern to be stored in a related data storehouse.
In this example, pattern one is the image of mother user, and the word one be assigned with is English words " mom " (mother); Pattern two is images of ocean, and word two is English words " vacation " (vacations); Pattern three is images of a dog, and word three is English words " Spot " (spots), is the name of dog.Especially preferred, pattern is very personalized with associating of word, is not that other hacker or thief easily guess.Such as, ocean pattern has very different connotations to different people, but in this particular embodiment, and it is local the seabeach picture taken on holiday in the past, therefore have selected this English words " vacation " (vacation).In addition, what match with English words " mom " (mother) also can be the sound of mother user or grandmother.
According to this simple example, the object of GUI display is in line three objects, the GUI therefore has three alternative positions, is respectively position one, position two and position three from left to right.A kind of sequence selected by user and/or server, and object can be selected according to this sequence, and to form a password, and this sequence is user knows in advance.Optionally sequence can be decided to be position two, position one at this, be then position three.Now user defines all conditions.
This its mode of operation of example stating method is as follows: user open computer or website login the space of a whole page time, display (the PC of authentication requesting or GUI can be seen, e-mail, bank account and networking access etc. login the space of a whole page), in this authentication requesting, user can see GUI and Password Input hurdle.The server that the software of operational system or system attempt access can extract three (being pattern one to three in this example) randomly and be arranged in a line from multiple default object being stored in data bank or the sound with related item, then shows to user.In this example, adopt the shown GUI of this software at position one display pattern three, position three display pattern one, position three display pattern two.
Now, by only having related word that user just knows, that associate with the sound that shown object or pattern or institute play and hear, just can define password by dynamic word string, this dynamic word string is made up of the order of some related word in one group of related word and object being stored in data bank.Action with regard to the correspondence of object shown in each part input word is the related word sequentially inputting user's setting according to known and default Selective sequence.Or, also some icons or object can be shown, these icons or object display user recognize the word that or pattern, for matching for the word or word identifying object of setting with user, user can use drag and drop mode, object with its pairing and user recognizes the icon that or object matches, thus input password string.
In the present example, identification sequences is position two, position one, position three, and therefore, password is exactly the word string be made up of according to this sequence the word associated with pattern, in this example, i.e. and pattern 1, pattern 3 and pattern 2.Therefore, in this example, the word string of password is " momspotvacation ".Related word is that user is easy to remember, because the object people that to be emotion deep, Di Fang He the photo of Pegs thing or picture.User password string with correct sequence inputting to Password Input hurdle, the software pattern that the password string of input and related data storehouse can be stored and object compare afterwards, thus examine certification.Because sequence is that user is known, word is also easy to remember, therefore can produce correct word string, thus user can be allowed to access.
After an authentication phase terminates (publish or shutoff device etc.), use the system of described software can delete before input password, when upper once certification (again logining), the group difference of the upper pattern to user's display of GUI or object, wherein in group, the number of object or pattern is more than the number of the point placing pattern, or pattern or object at least show with different sequential arrangement.
According to the list entries preset and the object or the pattern that are placed on three positions, software can determine a correct new password based on the object that GUI rearranges or pattern.Afterwards, user adopts same known array as identification sequences, just can determine correct word string easily, input and before diverse password.
In especially preferred System Implementation pattern, provide the known items and known sound selecting and identify together with other sound and object by user at another, send to user's device to show from the system server storing them and play.
When program is logined in user's startup, each object of user's device, picture, sound or other mark or display material is sent to all to be assigned random coded or the coded strings of a respective associated by server.Such association and random coded string are also temporary in the memory body of server.When user logins, the mark that user in object and sound and GUI is preset or match object or other counter pair and correctly match, the random coded associated with sound with object or text strings just can be combined and send to server, the random coded combined or text strings meeting and the pairing string being temporary in memory body compare, if correct, system just allows access.In a little pattern, coding or the distribution of text strings are random, and can not repeat during program of logining afterwards again.Therefore, the people that the input of hacker or other supervision user or networking are transmitted can not obtain the input string of input string and the pairing that can reuse, because in logining afterwards, associating the coding that sends when GUI logins for user or text strings with sound with each part object is brand-new coding or text strings, therefore the information of logining intercepted before is invalid.
This use Random assignment coding, word or other system pattern that can send identification code are especially preferred, because send the pairing random coded corresponding to the pairing of user or word or other identification code in fact do not need user's input characters or coding, and the picture, sound or the character image that only need the memory on GUI, symbol, object or icon and use just known or user just to know match.
In the example of above-mentioned the second situation, the sequence that shown object or pattern are shown to user on GUI is: position one display pattern two, position two display pattern three, position three display pattern one.Therefore, default and be " spotvacationmon " by user according to the determined password of known identification sequences, or, when using the identification code of Random assignment to match as sequence, the string of random word, numeral or other identification code composition that can send can be sent out and be temporary in the string that the random word of memory body, numeral or other identification code that can send form and compare mutually, whether match both confirming.
In all patterns, being sent to the sound that the image on the GUI of user, object, sound or other displayable object maybe can play is all that user is familiar with, user can not easily forget, but other people most does not also know these objects and sound, some object or sound friend and household are also not easy the correct pairing knowing them.
Those skilled in the art ought to know, can improve the complexity of system and the relevant difficulty of hack password by many factors.First, the stored total number of cases amount selected for user of articles in related data storehouse can be increased.Because object is preferably the pattern of personage that user knows or thing, the quantity of pattern or object can be a lot, and each associates a word, makes user easily remember.Such word association has advantage compared to existing technology, because only have user oneself just to know, this associates, and preferably uses user easy to remember but stranger's fundamentally ignorant pattern or object.
In addition, GUI also can be shown as longer object or sound sequence, or the sound being shown as the grid battle array of object or the matrix of object and/or interweaving with it, and/or GUI can make to make some to the sequence for input operation in grid battle array or matrix and changes.As previously mentioned, all these input recognizate having user and the word sent or coded strings, or match by software and the string arbitrarily produced.Therefore, identification sequences can comprise the sequence of unlimited amount, uses the object that a myriad of is specified by user.In addition, user can change the identification sequences of each authentication procedure alternatively, or by system by being randomly assigned to identification code or the string of sound and the object that will match or change of encoding, and it still can provide to user the prompting easily recognized, point out them sequence needed for the input in each stage, thus know the correct pairing given by GUI.
Method of the present invention allows user can dynamically configure object, picture or sound at GUI and connected sound play device, allow user watch, listen to and remember, and they and a word or other identification code that can read interrelated, thus determine correct user's input code, according to user setting and memory easy to remember and individualized condition performance cipher effect.When system connects networking, it at random identity assignments to object and sound, also adopt software to carry out data simultaneously and raise the price, prevent hacker from intercepting data when certification is carried out further.But, even if some Password Input data are obtained by electronic theft in a single stage, because the stage pairing object after each and the input recognizate of sound can change, it is also invalid for stealing input data as password in the next stage a stage.
Before detailed description the present invention at least one preferred embodiment, institute with regard to specification of the present invention is it is to be understood that embodiments of the present invention are not limited to aftermentioned detailed description or CONSTRUCTED SPECIFICATION shown in the drawings and component configuration.The present invention described here can have other execution mode, also can apply according to those skilled in the art's other method apparent and realize.And it is to be understood that term and word are intended to the present invention is described as used herein, it should not be regarded as limiting the present invention.
Therefore, it will be understood by those of skill in the art that concept of the present invention can be used as basis for designing other structure, method and system to realize multiple object of the present invention.Therefore, importantly, only otherwise depart from theory of the present invention and scope, the structure of these equivalences and method all should be included in claim.
In claim for describing in multiple inventive features and execution mode, the meaning of " comprising " some thing refers to including but not limited to this some thing.
Therefore, the meaning of " comprising " some thing refers to that this some thing is needs or necessary, but other parts are also optional, and it can comprise or not be included in this some thing.Being meant to of " by ... composition " comprises, and is only limited to formed composition.Therefore, the formed composition that is meant to of " by ... composition " to need or necessary, and do not comprise other composition.Being meant to of " in essence by ... composition " comprises formed any composition, and comprise other composition, but other composition is restricted to activity or the action that can not intervene or not form disclosed composition.Therefore, the formed composition that is meant to of " in essence by ... composition " to need or necessary, and other composition is also optional, and whether it comprises or be not included in composition the activity or action of depending on whether it affects institute's composition.
The object of this invention is to provide a kind of security system logined for user, this security system is the individual memory based on user, and therefore user is difficult to forget, other people fundamentally can not disassemble.
Above-mentioned and other the object of the present invention can describe in detail at following specification, and this detailed description is intended to intactly openly the present invention, and is not intended to limit the present invention.
Accompanying drawing explanation
In the part that this accompanying drawing comprised is specification, but accompanying drawing only illustrates partly not exclusive or exclusive examples of implementation and/or feature.The embodiment disclosed herein and accompanying drawing are only exemplary and indefiniteness.Accompanying drawing is described as follows:
Fig. 1 illustrates a preferred interface, wherein user's input system condition, and system condition comprises the object (image, short sentence, picture and sound etc.) recognized and the word associated with it maybe can transmit coded strings or word.
Fig. 2 is depicted as another preferred interfaces of authentication sequence/sequence inputting condition.
Fig. 3 is an embodiment in dynamic authentication stage, it illustrates " logining " space of a whole page, and the GUI of this space of a whole page display is the 3 grid battle arrays taking advantage of 3 totally nine lattice, the object that in grid battle array, display is different separately.
Fig. 4 is another embodiment in dynamic authentication stage, it illustrates " logining " space of a whole page, and the GUI of this space of a whole page display is the 3 grid battle arrays taking advantage of 3 totally nine lattice, but the positional alignment of grid battle array is different.
Fig. 5 illustrates the preferred flow chart of dynamical system.
Fig. 6 is the detail flowchart of the preferred program of the present invention.
Fig. 7 is the non-legible pattern of present system, wherein the image of display display or the sound of loud speaker broadcasting are that user knows in advance, the icon that they and image show or counter pair match mutually, software produces a certification string afterwards, and this pattern does not need the button operation transmitted by networking.
Fig. 8 is the non-legible pattern of present system, and the sound that the image of wherein display display or loud speaker are play is that user knows in advance, and they are when being distributed to user, and system is matched they and random string or identification code mutually.
Embodiment
One method and its system, this system adopts the personal information safeguard protection software run at computer apparatus or server, this system is provided with the input block arranged in order to personal information safeguard protection, video display unit and network communication parts, this system provides a kind of means to produce dynamic data structure or " word string ", the object that these dynamic data structures or " word string " and the user shown are familiar with or the music played back corresponding, and the object that the user that these show is familiar with or the music that plays back are that secret is in user, therefore the object relying on these users to be familiar with or the music played back just can produce certification or cipher string, to send when each operational phase logins.Described method be especially suitable for PC, mobile phone, smart phone, networking, website and other can operate on networking and the access control of the computer that user generally needs " logining " to access or intelligent apparatus, to protect personal information.
Simple, the present invention is by using private graphic user interface (graphic user interface, be called for short GUI), provide correct certification string dynamic structure or password to input to calculation element or server or other electronics access device in each new operational phase.Software merit rating is display one order, a grid battle array or a matrix and/or default object battle array and/or sound, and itself and word maybe can send message string corresponding associating, and this association only has user and system just to know.Wherein in a kind of pattern, user presets the more than one piece object in one group of object, and/or the multistage sound in one group of sound, but does not preset the position of object, also not time of preset sound or position that is relevant to it and the icon shown on GUI.Object described herein and sound are not determinate, its can include but not limited to any can recognize photo, drawing, picture, alphanumeric, the description of sound or sound or other can by GUI pixel show obtain or by loud speaker play obtain and user by viewing GUI or listen to the project recognized.
Object 16 can be comprise the combination of wherein one or more independently being shown by pixel or be embedded in group that picture, photo, image, drawing, diagram, short sentence, problem, numeral, alphabetic characters, color, colored alphabetic characters etc. in object background form.Sound can comprise the sound that one or more snippets user easily recognizes, the sound, Pegs thing boof of such as mother, child's voice or other user just listen just know but other people distinguish less than the sound of height secret.The object relevant to picture with regard to each or the sound relevant with an object, user presets word or the numeric string of associated respectively, or system is that each object or sound distribute a random coded strings or word.Fig. 5 and 6 illustrates the flow chart of method described here, but shown in Fig. 5 and 6 and non-limiting.
Can understand and know, although the present invention illustrates in flow charts, and preferred user interface is also shown as the simplest form, can make improvements when configuring of the present invention to each side of method disclosed herein and feature.Therefore, those of ordinary skill in the art are to be understood that, specification disclosed by the invention and description are the example describing preference pattern in the overall scope of the present invention and object, namely show their known object to user, input their known text strings for user.Specification of the present invention and description are also nonrestrictive.
Refer now to Fig. 1-6, wherein similar parts are with identical figure denote.Fig. 1 illustrates the preferred GUI of present system 10 or private user interface form 12, its can any by microprocessor driven and to user's display on the device being provided with input block and visual display such as LCD display or computer screen, these devices can be smart phones, laptop computer, computed table or any other can software program for execution and be provided with the device of the visual display be connected with software.Combine with privatization object and play the sound transmitted and play by the device such as loud speaker or earphone of be connected user's device.
The private user interface form 12 of system 10 illustrates an especially preferred example, and how display user sets first group of initial conditions.Preferably, the software that system performs runs on computer apparatus, such as server or smart phone or PC; Described software adopts Airborne Software, and it is configured to allow user to provide initial conditions such as word or pairing pixelation region, and its contact to related data storehouse.User preferably provides and sets the multiple objects 16 in one group of object 16, can recognize easily when wherein each part user sees, and provide and set the sound 17 that they can recognize easily, also provide simultaneously and associate input string accordingly or related word 18 combines with setting.Related word 18 is that user inputs as association input string, such as word and/or numeral.Each association input string provides corresponding related word 18 for object 16 or sound 17, association input string is stored in a data bank, can be used for afterwards display on identification GUI object 16 and play to the sound 17 of user, thus allow user to be operational phase input and produce certification string or a cipher authentication.The software merit rating that such cipher authentication adopts is the input receiving user, and the input of user with store correctly associate pairing, it has shown by using or has notified the known sequence of user instantly, to be associated with corresponding object 16 by arrangement and be stored in described related data storehouse each associate input string, draw combination of software contrast pairing certification string out, then certification string is matched in cipher authentication and combination of software contrast out and compare mutually.
Similarly, shown picture or picture or image object can be to obtain and user can recognize the object obtained after seeing any display in GUI display unit by pixel, and the sound play can be any sound that user easily recognizes when loud speaker or earphone broadcasting.The object 16 that image is correlated with it is expected to be comprise the combination of wherein one or more in the group of picture, photo, image, drawing, diagram, short sentence, problem, numeral, alphabetic characters, color, colored alphabetic characters etc. formation.Sound it is expected to be comprise mother sound, Pegs thing boof, child's voice or other user can easily recognize and be only the sound that user just knows.
The important ring of system 10 is that user easily can recognize the image related item 16 of display on GUI or play to the sound 17 that they listen, and easily recognize or remember form to every part object and/or every section of relevant letter or number matched of sound associate input string.In addition, system can show user setting association letter or number or associate with object associate input string, icon or pixel display pattern then at the picture element display area random display that the screen of GUI is preset, the prompting needed as user or as a kind of means in case image input message and object or sound are matched.The association picture concerned of input string or the position of image on GUI make to only have user just to know, and which associates input string and matches which object.Afterwards, user can input correct association input string, or the icon string drag and drop of correct display to the diagram coordinating suitable object or pairing sound.
Example shown in current is that first object is the picture 20 of a woman, and user have selected English words " sister " (elder sister) related word as first object.The picture 20 of this woman is the elder sister of user, and therefore user can easily remember, but other people is ignorant.
In the cipher authentication of any operational phase, user must remember this association pairing, to input the association input string that this user gives this picture, i.e. and related word " sister ".Due to when GUI Shows Picture, this picture has the meaning only having user just to know, therefore user can remember easily, but other people then easily can not recognize this meaning.The object that such use user is known or sound, if especially object relates to the people such as such as grandmother, or user once went to like again and remote place of spending holidays, though hacker or identity thief be not completely can not, the password of the user that also can be difficult to guess right.In addition, due to each operational phase, diagram and pairing input all can change, and password also can change, and plagiarized password even if to be stolen a glance at from afterwards by people, password string is not identical with this operational phase in next operational phase.
User can provide object 16 or the sound 17 of any amount, makes it be stored in related data storehouse, and with user to associate input string, identification code or related word 18 interrelated.The user of large quantity is used easily to recognize and object easy to remember 16 and sound 17; can well protection system from assault; meanwhile, user use word easy to remember or object and any privatization object 16 or the sound 17 play interrelated, also make user be easy to operating system.
As shown in the figure, second object 16 illustrates Arabic numerals 5 24, and it fills up a kind of color 26, such as red.Therefore, except user provides private image or picture, system also can comprise a data bank provides such extraneous items to select for user.In order to forfend hacker further, user can select English word " red " (redness) 28 as the related word of this object, instead of select English words " five " (numeral five), because front relevance may not be apparent for other people.In the middle of display object 16 or 17 can be played sound as the input of user and identification simultaneously.
3rd object 16 is shown as a problem 30 at GUI, and this problem 30 can be that user oneself presets, or elects from the great number of issues that related data storehouse stores.No matter be any one situation, user preferably provides the answer of a related word with regard to problem 30, this related word is very privatization, or only has user just to know, and is easy to remember.In example shown in the figure, user have selected " 1999 " 32 are as the answer of problem 30.
4th object 16 is shown as the circle 34 of band color 36, and the related word 18 that user presets associated is English words " circle " (circles) 38.At this, color 36 forfends hacker or identity thief for obscuring purely.In addition can provide more object 16, its quantity is shown by number of items 14, and showing number of items 14 in figure is n.
In operational applications, method of the present invention and its system have employed a software, and this software merit rating is arrange default object 16 (Fig. 3 and 4) shown at random or alternatively with sending on the dynamic GUI of user.As previously mentioned, the dynamic arrangement of the upper object 16 of GUI can be preset the linear precedence of object 16 in GUI, the means of grid battle array or matrix or other display sequence, this dynamic arrangement is that user knows in advance, and user also knows the input sequence of respective associated in advance because of knowing dynamic arrangement in advance.In addition, general sound and the sound only having user to recognize can mix object 16 and display the play to user.Therefore user is except providing the input of association with regard to object 16, and also corresponding sound 17 inputs their known recognizate simultaneously.
The identification sequences that object 16 on GUI shows recognizes identification sequences for user, determines the input sequence of related word 18 correspondence of corresponding shown object 16.As described in, the input authentication string that the object 16 that user recognizes with regard to every part and/or sound 17 input characters or coding combine is used for contrasting combination attestation string with one by software and compares, the composing method of described contrast combination attestation string is that software combines according to the sequence instantly sending to user to make it know and to associate with corresponding object 16 and to be stored in the input string that associates in described related data storehouse, and how the described sequence instantly sending to user to make it know shows object 16 according to system and draw the timing of sound 17.
If the result compared is pairing, certification is success just.Those skilled in the art should understand, the object 16 that more multi-user easily recognizes is provided, there is more multi-user and just knows its sound 17 looked like, and GUI is shown to be made up of object 16 and sound 17 and identification sequences for certification is more complicated, and hacker or thief be the more difficult password obtaining and identify user just.In addition, even if hacker can be aware of in a certain operational phase certification string sent as password, operational phase after each, the software of executive system can change GUI display, utilize different identification sequences and/or more than one piece object 16 and/or sound 17, in authentication operation afterwards, produce that other are different but user identifies the password string obtained.
Fig. 2 illustrates another user interface window 40 example, and it illustrates the optimal way of the condition entry of the identification sequences forming GUI display, and the identification sequences forming GUI display conveniently selects object thus determines password word string.In the case, user can see a GUI 42, and according to the embodiment in figure, it is the 3 grid battle arrays taking advantage of 3 totally nine lattice, and therefore having nine positions can for forming identification sequences 44.Identification sequences 44 can be selected by user, or by Systematic selection, to form identification sequences 44, wherein other object 16 display of object 16 or representative voice 17 can be sorted, so that in certification GUI 48,54 (Fig. 3 and 4) this sequence identified in the authentication phase being in general " logining ".In an illustrated embodiment, the identification sequences 44 of object 16 and sound 17 is a position, No. five positions and No. nine positions.It is to be understood that user must remember identification sequences 44, to determine correct text strings input sequence, thus input correct password.
Fig. 3 illustrates an example of authentication phase form 46.System can show a dynamic GUI48 to user, according to figure, dynamic GUI 48 is 3 grid battle arrays taking advantage of 3 totally nine lattice, wherein the object 16 preset of random alignment user and the object 16 representing the sound 17 play or icon.According to all default initial conditions before, user can be determined according to the identification sequences 44 preset and input a string password by identification object 16 and/or the sound 17 heard; By the association input string that identification related word 18 produces, the input string that independently associates that user is just formed according to each object 16 recognized and the related word 18 of sound 17 sets up a File 2, thus forms correct password.In example shown in the figure, File 2 password that the independently related word 18 of order input is formed is " 1999sisterred ".
According to the preference pattern of the inventive method, the user GUI 48 of customization can at networking, such as the Internet or cell phone system to transmit with secret or encryption or broadcast mode is distributed to user by server or computer, thus forfend the hacker that may occur.
After an authentication phase terminates (user logins), user publishes or closes closing electronic device.In the case, the server of executive system or networking computer apparatus can delete from memory body before password, then again randomly ordered according to the object preset user on GUI, or with regard to each object 16 or sound 17 Random assignment coded strings, to produce brand-new password, identify for user.Fig. 4 illustrates another authentication phase form 46, and the positional alignment of the object wherein on GUI 54 is not identical.Therefore, although identification sequences 44 remains unchanged, the position of the object 16 of object 16 or representative voice 17 changes, thus changes in password the combination associating input string, or changes the order of the word string defining proper password.In example shown in the figure, brand-new correct File 6 password is " redcircle1999 ".
Fig. 5 illustrates the flow chart of a kind of pattern in the inventive method.In order to security consideration, if user produces incorrect File 6 absent-mindedly when inputting related word 18 according to object 16 and sound 17 in Password Input hurdle 50, the object 16 that system can rearrange representative pattern or sound 17 is again shown in GUI, shows new arrangement mode to user.In order to further security consideration, system preferably limits the input trial that user makes certain number of times only, attempt for such as three times, system is pinned afterwards, prevents user from reattempting, in the case, user needs to wait for a period of time, or system can require that user is with other mode identification objects, such as, illustrate all default objects, then require that user's words inputted as non-major part are then whole default related words, to prove that they are identity of user.
Fig. 6 illustrates the more detailed flow chart of a kind of pattern in method and system of the present invention.
The present invention can have other application mode, such as, be applied to game, can know these other application modes easily after those skilled in the art understands the present invention.The explanation of feature of the present invention is not limited to the claim of the application, other application all of those skilled in the art's research and development, show to user the object order thus the input password changed or Verification System that they know in advance as long as relate to, all should include scope of the present invention in.
Fig. 7 illustrates the non-legible pattern of present system, and the sound that the known items 16 shown by wherein on user's answer of needing word that the image of object 16 (can be photo or diagram) or the object 16 that represents the sound 17 play and other shows with image or other image to show or display or loud speaker are play matches mutually; The image (can be photo or diagram) of described object 16 or the object 16 representing the sound 17 play be user recognize and only have user just to know it looks like or user knows that it looks like in advance.In this mode, user without any need for must networking transmit or may by the button operation of Malware record.In addition, in this mode, system can be each object 16 and each section of sound 17 allocated code string or transmissible identification code in either case randomly.When the user of identification object 16 and sound 17 uses GUI representing object 16 drag and drop of thing or sound to suitable image drag and drop pairing, software just can produce assembly coding string from the random coded string being dispensed to object 16 and sound 17.
Therefore, user to use on GUI visually arrange and issued out by system or placement basket that user presets or put area 19, for placing the object 16 of drag and drop, to match the image or sound that user knows.In such drag and drop pattern, each part object 16 and each section can the relevant all related random digit of sound 17 of the dog of drag and drop object 16 as other at loudspeaker or coded strings or text strings to one, and such drag and drop pattern is completely without any need for typewriting and the key-press input not needing transmission user completely.Otherwise, only need with slide-mouse or vernier, user just can comform pattern object 16 and/or the object 16 relevant with sound 17 that drag and drop in multidisplay object 16 match mutually to suitable placement basket or put area 19.Place basket or put area 19 by system 10 software the pixelation region deviding that identifies in the GUI that issues and show.
As shown in the figure, graphic interface shows the image of numerous humans and animals as image object 16, also can provide multistage sound 17, and it can associate with the sound object 16 of display or match.Only have user just to know in numerous image relevant to object 16 or sound 17, which just be placed on put area 19 other match, or which just match with another or other, thus needs are put area 19 extremely suitable for their drag and drop.
As shown in the figure, in the system 10 shown in Fig. 7 and 8, as image drag and drop to the placement basket of mother user of image object 16; Image (its pixelation region known on GUI display with the display of pixel image form, instead of shows with written form) drag and drop to the pixel of display English words " Mom " (mother) is shown as the put area 19 of No. two placement baskets.Placement basket on GUI or put area 19 have been recognized object 16 by coding for the software 10 of operational system in advance and have been placed in put area 19, so that combining random be dispensed to mother's image object 16 coded strings and with the coded strings of image object 16 of image display English words " Mom ", thus send an input string.The input string that this software produces is sent to the server at networking or performs the software of safeguard protection on the electronic device, then compares with correct temporary coded strings, determines whether both match; Described temporary coded strings correctly draws to the known issue of user and with the known random coded string that mother's image object 16 associates with the image object 16 showing English words " Mom " with image based on GUI.The random coded string of the object 16 that native system is always correlated with to each image object 16, sound 17 and sound based on the software distribution of system in the coded strings that this pattern produced and sent, alternatively, be also based on distribute to extraly user on GUI for two pieces object 16 drag and drop on it to make the random coded string of placement basket or the put area 19 matched.This pattern of system shown in Figure 8 10 all produces random coded or input string when each GUI display, and the random coded produced this time or input string never repeat in the stage of logining of after date.Therefore, hacker and networking burglar can not use the input string intercepting and obtain, because they only there will be once, are useless logining of after date.
In addition, be unfamiliar with user, the people of image or sound can attempt the word shown with image " grandmother " (grandmother) and woman's image of grandmother's form to match certainly, also can attempt word " the Spot " (spot that the image of dog and image are shown; The title of Ke Zuo Pegs thing dog) pairing, but refusal access can be caused like this, because only have the image object 16 of presetting pairing and sound 17 object 16 just can match, correct and be regarded as the random coded string of certification string or the random identification code sent to send a pair.
In addition, the sound that the image of the personage known by providing user, place, animal etc. and user know, and to provide with pixel image display but not the display of ASCII text formatting and user just know image that it looks like matches answer, native system allows to realize access by the drag and drop pairing of customization, and refusal realizes access with ASCII character input modes and refusal keyboard sends and may be realized access by the mode word intercepted.
Certainly, user wants which placement basket or destination in drag and drop to GUI, and have in numerous options actually the object 16 of how many representative image or sound be pairing thus can by drag and drop, be all determined in advance, and be early stored in the answer of related data storehouse as system hunts.Object 16 drag and drop that user shows pixel are run the Software Coding of system to object region or the action of placing basket, wherein each part can be recognized by the random train of its association of the object 16 of drag and drop or coding, this random train or coding can be sent out away afterwards, and software is then by searching these random trains of correct option identification or the coding of temporary data bank; The correct option of described temporary data bank draws based on the GUI being distributed to user and the random train distributed or input string; Described system is run on the server connecting networking or computer.Mistake can be produced the input coding of mistake by the object 16 of drag and drop.In addition, each time when GUI sends to user with the brand-new coding of each part object 16 of wanted drag and drop, coded strings or identification code, correct getting is deposited coding and will be changed.Preferably, the image that the known and data bank of a large amount of user has been filed and sound can and common image and sound mix use, all can send new common and non-mated images to guarantee to login at every turn, match the sound of image, common sound and the known pairing of user.
The present invention is at this with reference to the display of specific embodiment with describe its all basic characteristic sum feature, but above-mentioned disclosure can have much different improvement, change and substitute.Clearly, in some cases, only otherwise depart from scope of the present invention, then can apply some of them technical characteristic of the present invention and correspondingly not apply further feature.Only otherwise depart from main idea of the present invention and scope, those skilled in the art can realize different substituting, improving and change.All these substitute, improve and change all should be included in the scope of the invention that claims define.

Claims (17)

1. the generation certification input code that can change or password, is used for the method for accessed computer device such as smart phone or network server for user; Described computer apparatus is operatively connected to graphic user interface (GUI) and shows the display of object and be such as the alphanumeric input block of keyboard; Described computer apparatus also runs a set of software; The operating procedure of described method is as follows:
User, by using described alphanumeric input block, associates each part in object described in a group with an input string;
Described input string associated by each part in object described in described a group is electronically stored in a related data storehouse;
When logining described computer apparatus, send described GUI, the more than one piece object in object described in its described one group of display, each part is presented at the object independent position on GUI all respectively on GUI, and the object be presented on GUI forms a sequence;
User determines this sequence, and correspondingly to input corresponding described input string, described input string is that user is set related with each part in object described in described a group;
GUI provides an input area, inputs a certification string for user; The described alphanumeric input block of described certification string employing correspondingly inputs corresponding described input string according to described sequence and formed; Each described input string correspondingly inputted is selected in the more than one piece object be shown in the middle of the described object inputting password in described independent position related with described one group by user all separately;
According to described sequence, combining being stored in corresponding input string in described related data storehouse, forming contrast certification string; It is described that to be stored in the corresponding input string determined according to described sequence in described related data storehouse relevant with in the more than one piece object be shown in described independent position separately; And
The described certification string of user's input is compared with described contrast certification string, if both are determined by software, pairing is consistent, just sends certification to user.
2. the method for the generation certification input code that can change or password as claimed in claim 1, is characterized in that: described method also comprises the following steps:
The sequence all changing object aobvious on GU I is logined each time after described logining.
3. the method for the generation certification input code that can change or password as claimed in claim 1, is characterized in that: described method also comprises the following steps:
Permission user provides some or all objects in object described in described a group, and the object that user provides is shown by image display pattern, and it is interrelated that itself and user's object that is known and that be familiar with comprise personage, place, thing or sound;
User in object described in described a group provide and be known to user and the object be familiar with is positioned in the independent position described at least some, allow user remember its input string associated by object that is known and that be familiar with.
4. the method for the generation certification input code that can change or password as claimed in claim 2, is characterized in that: described method also comprises the following steps:
Permission user provides some or all objects in object described in described a group, and the object that user provides is shown by image display pattern, and it is interrelated that itself and user's object that is known and that be familiar with comprise personage, place, thing or sound;
User in object described in described a group provide and be known to user and the object be familiar with is positioned in the independent position described at least some, allow user remember its input string associated by object that is known and that be familiar with.
5. the method for the generation certification input code that can change or password as claimed in claim 1, is characterized in that: described method also comprises the following steps:
Described in described one group, object comprises one or more problem; And
The corresponding answer of each problem that object described in described a group is comprised electronically is stored in described related data storehouse, as with one of related described input string of each part in object described in described a group.
6. the method for the generation certification input code that can change or password as claimed in claim 2, is characterized in that: described method also comprises the following steps:
Described in described one group, object comprises one or more problem; And
The corresponding answer of each problem that object described in described a group is comprised electronically is stored in described related data storehouse, as with one of related described input string of each part in object described in described a group.
7. the method for the generation certification input code that can change or password as claimed in claim 3, is characterized in that: described method also comprises the following steps:
Described in described one group, object comprises one or more problem; And
The corresponding answer of each problem that object described in described a group is comprised electronically is stored in described related data storehouse, as with one of related described input string of each part in object described in described a group.
8. the method for the generation certification input code that can change or password as claimed in claim 4, is characterized in that: described method also comprises the following steps:
Described in described one group, object comprises one or more problem; And
The corresponding answer of each problem that object described in described a group is comprised electronically is stored in described related data storehouse, as with one of related described input string of each part in object described in described a group.
9. the method for the generation certification input code that can change or password as claimed in claim 1, is characterized in that: described method also comprises the following steps:
Described in described one group, object comprises one or more problem; And
The corresponding answer of each problem that object described in described a group is comprised electronically is stored in described related data storehouse, as with one of related described input string of each part in object described in described a group; Described corresponding answer is provided by user.
10. the method for the generation certification input code that can change or password as claimed in claim 2, is characterized in that: described method also comprises the following steps:
Described in described one group, object comprises one or more problem; And
The corresponding answer of each problem that object described in described a group is comprised electronically is stored in described related data storehouse, as with one of related described input string of each part in object described in described a group; Described corresponding answer is provided by user.
The method of the 11. generation certification input code that can change or passwords as claimed in claim 3, is characterized in that: described method also comprises the following steps:
Described in described one group, object comprises one or more problem; And
The corresponding answer of each problem that object described in described a group is comprised electronically is stored in described related data storehouse, as with one of related described input string of each part in object described in described a group; Described corresponding answer is provided by user.
The method of the 12. generation certification input code that can change or passwords as claimed in claim 4, is characterized in that: described method also comprises the following steps:
Described in described one group, object comprises one or more problem; And
The corresponding answer of each problem that object described in described a group is comprised electronically is stored in described related data storehouse, as with one of related described input string of each part in object described in described a group; Described corresponding answer is provided by user.
The method of the 13. generation certification input code that can change or passwords as claimed in claim 1, is characterized in that: described method also comprises the following steps:
Described in described one group, object comprises one or more alphabetic characters; Each alphabetic characters has color;
Each color described or each alphabetic characters itself are electronically stored in described related data storehouse, as one of described input string, its in object described in described a group as the corresponding letters digit of corresponding object or color relevant; And
User is allowed to input described color or alphabetic characters itself some as described certification string.
The method of the 14. generation certification input code that can change or passwords as claimed in claim 2, is characterized in that: described method also comprises the following steps:
Described in described one group, object comprises one or more alphabetic characters; Each alphabetic characters has color;
Each color described or each alphabetic characters itself are electronically stored in described related data storehouse, as one of described input string, its in object described in described a group as the corresponding letters digit of corresponding object or color relevant; And
User is allowed to input described color or alphabetic characters itself some as described certification string.
The method of the 15. generation certification input code that can change or passwords as claimed in claim 3, is characterized in that: described method also comprises the following steps:
Described in described one group, object comprises one or more alphabetic characters; Each alphabetic characters has color;
Each color described or each alphabetic characters itself are electronically stored in described related data storehouse, as one of described input string, its in object described in described a group as the corresponding letters digit of corresponding object or color relevant; And
User is allowed to input described color or alphabetic characters itself some as described certification string.
The method of the 16. generation certification input code that can change or passwords as claimed in claim 4, is characterized in that: described method also comprises the following steps:
Described in described one group, object comprises one or more alphabetic characters; Each alphabetic characters has color;
Each color described or each alphabetic characters itself are electronically stored in described related data storehouse, as one of described input string, its in object described in described a group as the corresponding letters digit of corresponding object or color relevant; And
User is allowed to input described color or alphabetic characters itself some as described certification string.
The certification input code that 17. generations can change or password, be used for the method for accessed computer device such as smart phone or network server for user; Described computer apparatus is operatively connected to graphic user interface (GUI) and shows the display of one group of object and described object specified and is displaced to the input unit of the put area on GUI; Said method comprising the steps of:
Permission user provides some or all objects in described one group of object, and the object that user provides is the object that user knows and is familiar with, and comprises personage, place, thing or sound;
These objects are stored in a related data storehouse; Described related data storehouse is on the server connecting networking; Described server can access the computer apparatus of user;
When user will access, described one group of object is sent to described computer apparatus, and wherein each part object obtains the random identification code of distribution one correspondence;
The object of a pair association allowing user to use described input unit that user is selected is displaced to the put area on GUI;
Software determines which part object is displaced to put area, and then by the every a pair selected association object selected of combination random identification code separately, combination draws certification input code;
The certification input code that described combination draws is sent to described server;
The certification input code that described combination draws is compared mutually with the certification input code calculated in server; The way of the certification input code calculated described in acquisition uses to be stored in described related data storehouse to be preset as described a pair object matched by the correct association of the association object selected by user, each for a pair object of described correct association pairing self-corresponding and random identification code obtaining distribution before when user will access is combined, the certification input code calculated described in drawing;
If the certification input code that described combination draws matches consistent with the described certification input code calculated, user just can be allowed to access described computer apparatus or described server; And
When user will access again afterwards, for each part object distributes the random identification code of new correspondence.
CN201380054832.5A 2012-08-23 2013-08-23 Dynamic data structure is generated for certification and/or the method for cipher Expired - Fee Related CN104885403B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US13/593,287 2012-08-23
US13/593,287 US8813219B2 (en) 2012-08-23 2012-08-23 Method for producing dynamic data structures for authentication and/or password identification
PCT/US2013/056458 WO2014032001A1 (en) 2012-08-23 2013-08-23 Method for producing dynamic data structures for authentication and/or password identification

Publications (2)

Publication Number Publication Date
CN104885403A true CN104885403A (en) 2015-09-02
CN104885403B CN104885403B (en) 2018-10-16

Family

ID=50149242

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201380054832.5A Expired - Fee Related CN104885403B (en) 2012-08-23 2013-08-23 Dynamic data structure is generated for certification and/or the method for cipher

Country Status (11)

Country Link
US (1) US8813219B2 (en)
EP (2) EP3564838B1 (en)
JP (1) JP6226153B2 (en)
KR (1) KR101719933B1 (en)
CN (1) CN104885403B (en)
AU (1) AU2013305606B2 (en)
BR (1) BR112015003593A2 (en)
CA (1) CA2922257C (en)
MX (1) MX367047B (en)
PH (1) PH12015500368B1 (en)
WO (1) WO2014032001A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108206737A (en) * 2016-12-16 2018-06-26 柯呈翰 For generating the method and system of Multiple Factors authentication code
CN110603577A (en) * 2017-05-08 2019-12-20 长谷川香料株式会社 Method for representing image by color and color representation chart

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140304834A1 (en) * 2011-10-04 2014-10-09 Andrew Hulse Personalized Secure Data Access Techniques
US9135416B2 (en) * 2013-02-25 2015-09-15 International Business Machines Corporation GUI-based authentication for a computing system
US9332119B1 (en) * 2013-03-07 2016-05-03 Serdar Artun Danis Systems and methods for call destination authenticaiton and call forwarding detection
KR101359874B1 (en) * 2013-09-09 2014-02-10 주성민 The user authentication device based on one time password generation which is using the virtual input and the method
IN2013DE02920A (en) * 2013-10-03 2015-04-10 Samsung India Electronics Pvt Ltd
US9082121B2 (en) * 2013-10-23 2015-07-14 Mastercard International Incorporated System and method for guided passcode entry
US10049202B1 (en) 2014-03-25 2018-08-14 Amazon Technologies, Inc. Strong authentication using authentication objects
US10050787B1 (en) * 2014-03-25 2018-08-14 Amazon Technologies, Inc. Authentication objects with attestation
US9264419B1 (en) 2014-06-26 2016-02-16 Amazon Technologies, Inc. Two factor authentication with authentication objects
US20160048665A1 (en) * 2014-08-12 2016-02-18 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. Unlocking an electronic device
CN105468962A (en) * 2014-09-03 2016-04-06 阿里巴巴集团控股有限公司 User interface unlocking method and apparatus
GB2538379A (en) * 2015-04-17 2016-11-16 Outbound Services Pty Ltd Method of authentication
US11410165B1 (en) 2015-12-10 2022-08-09 Wells Fargo Bank, N.A. Systems and methods for providing queued credentials for an account
KR20170143381A (en) * 2016-06-21 2017-12-29 김봉주 Method for authenticating user with personalized question
US10182047B1 (en) * 2016-06-30 2019-01-15 Snap Inc. Pictograph password security system
WO2018034937A1 (en) * 2016-08-15 2018-02-22 Natividad Alejandro V Method for producing dynamic data structures for authentication and/or password identification
FR3059865B1 (en) * 2016-12-05 2019-05-10 B<>Com METHOD FOR AUTHENTICATING TERMINAL EQUIPMENT, DEVICE, SERVER EQUIPMENT AND COMPUTER PROGRAM
US10558790B2 (en) * 2017-05-31 2020-02-11 International Business Machines Corporation Multi-level matrix passwords
US20190340352A1 (en) * 2018-05-03 2019-11-07 Ivan JC Peeters Method for producing dynamic password identification for users such as machines
US11233779B2 (en) * 2018-06-03 2022-01-25 Apple Inc. Wireless credential sharing
US11468151B2 (en) 2018-08-30 2022-10-11 Ideola, Inc. System and method for memetic authentication and identification
US11443030B2 (en) * 2019-06-10 2022-09-13 Sherman Quackenbush Mohler Method to encode and decode otherwise unrecorded private credentials, terms, phrases, or sentences
US11188634B2 (en) 2019-11-10 2021-11-30 David MAROSHI Method for assisting secure insertion of passwords
US11816638B2 (en) * 2020-10-14 2023-11-14 Bank Of America Corporation Electronic mail verification

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040230843A1 (en) * 2003-08-20 2004-11-18 Wayne Jansen System and method for authenticating users using image selection
CN1830190A (en) * 2003-07-29 2006-09-06 汤姆森特许公司 Controlling access to a network using redirection
CN201332401Y (en) * 2008-08-27 2009-10-21 深圳市络道科技有限公司 Compulsory two-way dynamic password authentication system and user password generator
CN101796764A (en) * 2007-07-31 2010-08-04 国际商业机器公司 Biometric authentication device, system and method of biometric authentication
US8151343B1 (en) * 2007-07-30 2012-04-03 Intuit Inc. Method and system for providing authentication credentials

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5821933A (en) * 1995-09-14 1998-10-13 International Business Machines Corporation Visual access to restricted functions represented on a graphical user interface
AU2003259396A1 (en) * 2003-08-29 2005-03-16 Nokia Corporation Method and device for customized picture-based user identification and authentication
US8732477B2 (en) * 2006-05-24 2014-05-20 Confident Technologies, Inc. Graphical image authentication and security system
US20070277224A1 (en) * 2006-05-24 2007-11-29 Osborn Steven L Methods and Systems for Graphical Image Authentication
US8176332B2 (en) * 2007-02-15 2012-05-08 Christopher Nathan Drake Computer security using visual authentication
JP2008217716A (en) * 2007-03-07 2008-09-18 Sharp Corp Authentication device, image forming apparatus, authentication system, authentication program, recording medium and authentication method
US8086745B2 (en) * 2008-08-29 2011-12-27 Fuji Xerox Co., Ltd Graphical system and method for user authentication
US8510811B2 (en) * 2009-02-03 2013-08-13 InBay Technologies, Inc. Network transaction verification and authentication
US8191126B2 (en) * 2009-05-04 2012-05-29 Indian Institute Of Technology Madras Methods and devices for pattern-based user authentication
US8214892B2 (en) * 2009-07-15 2012-07-03 Hewlett-Packard Development Company, L.P. Password authentication system and methods
CN102207809A (en) * 2010-03-30 2011-10-05 国基电子(上海)有限公司 Handheld device and unlocking method thereof
WO2011162832A1 (en) * 2010-06-25 2011-12-29 Pass Touch, Llc System and method for signature pathway authentication and identification
US8539574B2 (en) * 2010-09-09 2013-09-17 Christopher Michael Knox User authentication and access control system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1830190A (en) * 2003-07-29 2006-09-06 汤姆森特许公司 Controlling access to a network using redirection
US20040230843A1 (en) * 2003-08-20 2004-11-18 Wayne Jansen System and method for authenticating users using image selection
US8151343B1 (en) * 2007-07-30 2012-04-03 Intuit Inc. Method and system for providing authentication credentials
CN101796764A (en) * 2007-07-31 2010-08-04 国际商业机器公司 Biometric authentication device, system and method of biometric authentication
CN201332401Y (en) * 2008-08-27 2009-10-21 深圳市络道科技有限公司 Compulsory two-way dynamic password authentication system and user password generator

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108206737A (en) * 2016-12-16 2018-06-26 柯呈翰 For generating the method and system of Multiple Factors authentication code
CN110603577A (en) * 2017-05-08 2019-12-20 长谷川香料株式会社 Method for representing image by color and color representation chart
US11138766B2 (en) 2017-05-08 2021-10-05 T. Hasegawa Co., Ltd. Method for expressing image with colors and color expression drawing

Also Published As

Publication number Publication date
CA2922257A1 (en) 2014-02-27
EP3564838B1 (en) 2021-02-24
WO2014032001A1 (en) 2014-02-27
EP2888834A4 (en) 2016-06-22
BR112015003593A2 (en) 2017-07-04
EP2888834A1 (en) 2015-07-01
JP2015532751A (en) 2015-11-12
MX2015002271A (en) 2015-10-15
CN104885403B (en) 2018-10-16
EP2888834B1 (en) 2019-10-30
PH12015500368A1 (en) 2015-04-20
AU2013305606A1 (en) 2015-04-09
MX367047B (en) 2019-08-02
KR20150047569A (en) 2015-05-04
KR101719933B1 (en) 2017-04-04
EP3564838A1 (en) 2019-11-06
CA2922257C (en) 2021-01-05
JP6226153B2 (en) 2017-11-08
US8813219B2 (en) 2014-08-19
PH12015500368B1 (en) 2015-04-20
AU2013305606B2 (en) 2017-01-19
US20140059672A1 (en) 2014-02-27

Similar Documents

Publication Publication Date Title
CN104885403A (en) Method for producing dynamic data structures for authentication and/or password identification
US9419966B2 (en) Method for producing dynamic data structures for authentication and/or password identification
KR102070341B1 (en) User dependent functions and data in a mobile communication device
US20160359839A1 (en) Method for producing dynamic data structures for authentication and/or password identification
US9729540B2 (en) System and method for user authentication
CN1968471B (en) Mobile communication terminal having an enhanced data management function
CN107077559B (en) Verification System reminds terminal and information recording carrier
CN103488940A (en) Password protection system and method for application programs of intelligent equipment
CN101005661A (en) Mobile terminal with data and menu hidden function and its enciphering hiding method
KR102491360B1 (en) Systems and methods for providing user accounts that allow users to operate computing devices
CN105210074A (en) Authentication using a subset of a user-known code sequence
CN101794365A (en) Method for safely inputting information on mobile terminal and mobile terminal
CN106648583A (en) Information processing method and terminal
US9652914B2 (en) Methods and systems for secure pass-set entry
US20180293399A1 (en) Patient privacy de-identification in firewall switches forming VLAN segregation
US20140344339A1 (en) System for providing personal information using cloud id card and method thereof
JP2014026383A (en) Portable terminal, authentication system of portable terminal, authentication method of portable terminal, and program
CN103729592A (en) Electronic device and starting method of function interface of electronic device
WO2018034937A1 (en) Method for producing dynamic data structures for authentication and/or password identification
KR20190137232A (en) Server for auto encrypting of personal information and method for creating access authority using the same
WO2016028626A1 (en) Method for producing dynamic data structures for authentication and/or password identification
KR20090025584A (en) Portable terminal and method for storing message and displaying message at portable terminal

Legal Events

Date Code Title Description
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20181016

CF01 Termination of patent right due to non-payment of annual fee